1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Charra [1.4K]
3 years ago
11

Which of the following is a document view you can select using Button on the status bar?

Computers and Technology
1 answer:
levacccp [35]3 years ago
8 0

Answer:

la b

Explanation:

You might be interested in
Ian recently earned his security certification and has been offered a promotion to a position that requires him to analyze and d
vladimir1956 [14]

Answer:

A. Security administrator

Explanation:

Security administrator -

In the field of information technology , a security administrator is responsible to control the information technology related security , all the safety issues in the company , is the work profile of a Security administrator.

The person is responsible fight against any malware and virus which can attack the system .

Hence, from the given scenario of the question,

Ian is offered the position of a security administrator.

4 0
3 years ago
Question
Lorico [155]

Answer: Insert  :-) !

Explanation:

8 0
3 years ago
Which number is equivalent to 3e-2?<br> 3<br> 0.3<br> O 30<br> my<br> 0.03
Ipatiy [6.2K]

Answer:

0.03

Explanation:

4 0
3 years ago
The benefits associated with software reuse are lower cost, better quality,
Sholpan [36]

Answer:

Software reuse is the technique through which updating the software system through the already defined components or assets of the software.This helps in increasing the productivity ,cost decrement , quality improvement etc.

But in actual case, the software reuse still persist high cost due to modification of inflexible designing of software .It also costs more than expected for the maintenance and training of software.

The security of the software is always at risk because of the usual and advanced hacking and attacking by the hackers even when the protect of software is high.Thus, these statements verify that the benefits of cost and security of software is not actually realized.

6 0
4 years ago
A spreadsheet is an example of a(n):
zhenek [66]

Answer:

general-purpose application

Explanation:

General purpose application

1. These are software applications which can be used for multiple purposes.

2. These applications perform various tasks as per the need of the user. These tasks can vary in complexity and may or may not be related to each other.

3. These applications are useful for almost all categories of users.

Example include spreadsheets which is a primary application for accounting purpose. It can also be used for to store numerical data or other data in an organized format.

Another use of spreadsheets is visible in data analysis. Graphs and charts can be created based on the given numerical data stored in the spreadsheet. This helps in business growth.

Microsoft Excel and Apple Numbers are spreadsheet applications.

Another example is a word application that can be used to prepare document, reports, and flyers also. Microsoft word is a word processor.

Specialized program

1. These are software applications which can be used for special purpose only.

2. These applications can perform only the task for which it is created.

Examples include windows media player. This application can only run media (audio or video) programs.

System application

1. These include operating system and utility applications.

2. The operating system acts as an interface between the user and the hardware resources of the computer.

For example, Windows is an operating system. It is available in various versions.

3. The computer system and its resources, both software and hardware, are maintained and optimized using utility applications.

Anti-virus is an example of utility applications. It protects the computer resources from virus.

Utility applications

4. The computer system and its resources, both software and hardware, are maintained and optimized using utility applications.

5. These applications are mandatory to smooth functioning of a computer.

For example, disk driver, file manager and back up applications help in managing disks and aid in taking back ups and file management is done by file manager

8 0
3 years ago
Other questions:
  • What purpose would tracking changes be most useful for?
    7·1 answer
  • Write a program that finds the largest in a series of numbers entered by the user.The program must prompt the user to enter numb
    12·1 answer
  • You can use this effect to break a color into a percentage of its full strength.
    13·1 answer
  • While multiple objects of the same class can exist, in a given program there can be only one version of each class. Group of ans
    6·1 answer
  • The northern half of this continent is primarily rainforest and savanna.
    5·1 answer
  • Why wouldn't a game using just run-length encodings be challenging?
    9·1 answer
  • 1. Many photographs tell a story. What is the story of this photograph? What is happening? Where is the photograph taken? Why is
    6·1 answer
  • Which option will be used to attach email messages ​
    6·1 answer
  • Trademarks _____.
    12·2 answers
  • 2
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!